Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Information & knowledge management
»
Information security
Information security
Information security
Information security, cybersecrity, Cyberdefence
Launching Narrative into the Information Battlefield
Waldman, Suzanne
, and
Sean Havel
.
"
Launching Narrative into the Information Battlefield
."
Connections: The Quarterly Journal
21, no. 2 (2022): 111-122.
Introduction
21.2.08_launching_narrative_f.pdf
— Downloaded 614 times
Read more
about Launching Narrative into the Information Battlefield
3735 reads
Google Scholar
DOI
RTF
EndNote XML
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
Umar, Mubarak Albarka
,
Zhanfang Chen
, and
Yan Liu
.
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
In
Information & Security: An International Journal
. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf
— Downloaded 2574 times
Read more
about A Hybrid Intrusion Detection with Decision Tree for Feature Selection
6119 reads
Google Scholar
DOI
RTF
EndNote XML
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Skiter, Ihor
,
Ivan Burmaka
, and
Andriy Sigayov
.
"
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
."
Information & Security: An International Journal
47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf
— Downloaded 2761 times
Read more
about Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
5959 reads
Google Scholar
DOI
RTF
EndNote XML
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
Nekhai, Valentin V.
,
Mariia Dorosh
, and
Valentin A. Nekhai
.
"
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
."
Information & Security: An International Journal
46, no. 2 (2020): 168-181.
4612_sa_agricultural.pdf
— Downloaded 2832 times
Read more
about Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
6349 reads
Google Scholar
DOI
RTF
EndNote XML
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
Sharkov, George
,
Yavor Papazov
,
Christina Todorova
,
Georgi Koykov
, and
Georgi Zahariev
.
"
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
."
Information & Security: An International Journal
46, no. 2 (2020): 155-167.
4611_monsys.pdf
— Downloaded 3138 times
Read more
about MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
9148 reads
Google Scholar
DOI
RTF
EndNote XML
Security Analysis of Diceware Passphrases
Antonov, Petar
, and
Nikoleta Georgieva
.
"
Security Analysis of Diceware Passphrases
."
Information & Security: An International Journal
47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf
— Downloaded 4759 times
Read more
about Security Analysis of Diceware Passphrases
7723 reads
Google Scholar
DOI
RTF
EndNote XML
A New Steganographic Algorithm for Hiding Messages in Music
Bajor, Michał
, and
Marcin Niemiec
.
"
A New Steganographic Algorithm for Hiding Messages in Music
."
Information & Security: An International Journal
47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf
— Downloaded 3722 times
Read more
about A New Steganographic Algorithm for Hiding Messages in Music
9303 reads
Google Scholar
DOI
RTF
EndNote XML
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
Shevchenko, Volodymyr
,
Georgi Dimitrov
,
Denys Berestov
,
Pepa Petrova
,
Igor Sinitcyn
,
Eugenia Kovatcheva
,
Ivan Garvanov
, and
Iva Kostadinova
.
"
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
."
Information & Security: An International Journal
47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf
— Downloaded 3021 times
Read more
about One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
5711 reads
Google Scholar
DOI
RTF
EndNote XML
Adopting Machine Learning for Images Transferred with LoRaWAN
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf
— Downloaded 2957 times
Read more
about Adopting Machine Learning for Images Transferred with LoRaWAN
6451 reads
Google Scholar
DOI
RTF
EndNote XML
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf
— Downloaded 2742 times
Read more
about Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
7235 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
1
2
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Theoretical views
C4ISR
Information management
Knowledge management
Information security
Processes & Architectures
Simulation and Training
Change management
Decision-making
Good governance